Skip to content

Commit

Permalink
update documentation for azure plugins moved from security centre to …
Browse files Browse the repository at this point in the history
…defender (#720)

* update documentation for azure plugins moved from security centre to defender

* update documentation for azure plugins moved from security centre to defender

* update auto-provisioning-enabled.md with correct spacing

* update high-severity-alerts-enabled.md with correct spacing

* update monitor-endpoint-protection.md with spacing changes

* update monitor-external-accounts-with-write-permissions.md with spacing changes

* update monitor-ip-forwarding.md with spacing changes

* update monitor-jit-network-access.md with spacing changes

* update monitor-next-generation-firewall.md with spacing changes

* update monitor-system-updates.md with spacing changes

* update changes in monitor-total-number-of-subscription-owners.md

* update security-configuration-monitoring.md with spacing changes

* update changes in security-contact-additional-email.md

* update security-contacts-enabled-for-subscription-owner.md with spacing changes

* update security-contacts-enabled.md with spacing changes

* update spacing for standard-pricing-enabled.md

* update auto-provisioning-enabled.md with spacing changes

---------

Co-authored-by: AkhtarAmir <AkhtarAmir>
  • Loading branch information
AkhtarAmir authored Oct 14, 2024
1 parent 42998e1 commit 3f08e8f
Show file tree
Hide file tree
Showing 257 changed files with 408 additions and 484 deletions.
32 changes: 15 additions & 17 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -175,6 +175,21 @@ This repository is an extension of CloudSploit's [open-source scanning engine](h
* [Container Apps Has Tags](en/azure/containerapps/container-apps-has-tags.md)
* Container Registry
* [ACR Admin User](en/azure/containerregistry/acr-admin-user.md)
* Defender
* [Auto Provisioning Enabled](en/azure/defender/auto-provisioning-enabled.md)
* [High Severity Alerts Enabled](en/azure/defender/high-severity-alerts-enabled.md)
* [Monitor Endpoint Protection](en/azure/defender/monitor-endpoint-protection.md)
* [Monitor External Accounts with Write Permissions](en/azure/defender/monitor-external-accounts-with-write-permissions.md)
* [Monitor IP Forwarding](en/azure/defender/monitor-ip-forwarding.md)
* [Monitor JIT Network Access](en/azure/defender/monitor-jit-network-access.md)
* [Monitor Next Generation Firewall](en/azure/defender/monitor-next-generation-firewall.md)
* [Monitor System Updates](en/azure/defender/monitor-system-updates.md)
* [Monitor Total Number of Subscription Owners](en/azure/defender/monitor-total-number-of-subscription-owners.md)
* [Security Configuration Monitoring](en/azure/defender/security-configuration-monitoring.md)
* [Security Contact Additional Email](en/azure/defender/security-contact-additional-email.md)
* [Security Contacts Enabled](en/azure/defender/security-contacts-enabled.md)
* [Security Contact Enabled for Subscription Owner](en/azure/defender/security-contacts-enabled-for-subscription-owner.md)
* [Standard Pricing Enabled](en/azure/defender/standard-pricing-enabled.md)
* File Service
* [File Service All Access ACL](en/azure/fileservice/file-service-all-access-acl.md)
* Key Vaults
Expand Down Expand Up @@ -256,23 +271,6 @@ This repository is an extension of CloudSploit's [open-source scanning engine](h
* [Send Alerts Enabled](en/azure/sqlserver/send-alerts-enabled.md)
* [Server Auditing Enabled](en/azure/sqlserver/server-auditing-enabled.md)
* [TDE Protector Encrypted](en/azure/sqlserver/tde-protector-encrypted.md)
* Security Center
* [Admin Security Alerts Enabled](en/azure/securitycenter/admin-security-alerts-enabled.md)
* [Application Whitelisting Enabled](en/azure/securitycenter/application-whitelisting-enabled.md)
* [Auto Provisioning Enabled](en/azure/securitycenter/auto-provisioning-enabled.md)
* [High Severity Alerts Enabled](en/azure/securitycenter/high-severity-alerts-enabled.md)
* [Monitor Blob Encryption](en/azure/securitycenter/monitor-blob-encryption.md)
* [Monitor Disk Encryption](en/azure/securitycenter/monitor-disk-encryption.md)
* [Monitor Endpoint Protection](en/azure/securitycenter/monitor-endpoint-protection.md)
* [Monitor JIT Network Access](en/azure/securitycenter/monitor-jit-network-access.md)
* [Monitor NSG Enabled](en/azure/securitycenter/monitor-nsg-enabled.md)
* [Monitor SQL Auditing](en/azure/securitycenter/monitor-sql-auditing.md)
* [Monitor SQL Encryption](en/azure/securitycenter/monitor-sql-encryption.md)
* [Monitor System Updates](en/azure/securitycenter/monitor-system-updates.md)
* [Monitor VM Vulnerability](en/azure/securitycenter/monitor-vm-vulnerability.md)
* [Security Configuration Monitoring](en/azure/securitycenter/security-configuration-monitoring.md)
* [Security Contacts Enabled](en/azure/securitycenter/security-contacts-enabled.md)
* [Standard Pricing Enabled](en/azure/securitycenter/standard-pricing-enabled.md)
* Storage Accounts
* [Blob Service Encryption](en/azure/storageaccounts/blob-service-encryption.md)
* [File Service Encryption](en/azure/storageaccounts/file-service-encryption.md)
Expand Down
28 changes: 28 additions & 0 deletions en/azure/defender/auto-provisioning-enabled.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AZURE / Defender / Auto Provisioning Enabled

## Quick Info

| | |
|-|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Plugin Title** | Auto Provisioning Enabled |
| **Cloud** | AZURE |
| **Category** | Defender |
| **Description** | Ensures that automatic provisioning of the monitoring agent is enabled.|
| **More Info** | The Microsoft Monitoring Agent scans for various security-related configurations and events such as system updates, OS vulnerabilities, and endpoint protection and provides alerts.|
| **AZURE Link** | https://learn.microsoft.com/en-us/azure/defender-for-cloud/monitoring-components|
| **Recommended Action** | Ensure that the data collection settings of the subscription have Auto Provisioning set to enabled.|

## Detailed Remediation Steps

1. Log in to the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for "Microsoft Defender for Cloud". </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step2.png"/>
3. On the "Microsoft Defender for Cloud" page scroll down the left navigation panel and choose "Environment Settings". </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step3.png"/>
4. On the "Environment Settings" page, select the "Subscription" by clicking on its "Name". </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step4.png"/>
5. Under the "Settings" page, click on "Defender Plans". </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step5.png"/>
6. On the "Settings | Defender" page, select the "Settings and Monitoring Tab". </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step6.png"/>
7. On the settings and Monitoring Page. If the "Log Analytics agent" shows status as turned off, then the "Automatic provisioning" of the monitoring agent is not enabled. </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step7.png"/>
8. On the "Settings | Auto provisioning" page, turn the status "ON" for "Log Analytics agent for Azure VMs" by toggling it. </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step8.png"/>
9. This will open the "Auto Provisioning configuration". Under Workplace Selection, select the "Default Workspace(s)" and select "Apply" to save changes. </br> <img src="/resources/azure/defender/auto-provisioning-enabled/step9.png"/>
10. Repeat step number 3 - 9 to ensure that the data collection settings of the subscription have Auto Provisioning set to enabled.</br>
27 changes: 27 additions & 0 deletions en/azure/defender/high-severity-alerts-enabled.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AZURE / Defender / High Severity Alerts Enabled

## Quick Info

| | |
|-|-------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Plugin Title** | High Severity Alerts Enabled|
| **Cloud** | AZURE|
| **Category** | Defender|
| **Description** | Ensures that high severity alerts are enabled and properly configured.|
| **More Info** | Enabling high severity alerts ensures that microsoft alerts for potential security issues are sent and allows for quick mitigation of the associated risks. |
| **AZURE Link** | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications|
| **Recommended Action** | Enable email alert notification and configure its severity level.|

## Detailed Remediation Steps

1. Log in to the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for "Microsoft Defender for Cloud". </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step2.png"/>
3. On the "Microsoft Defender for Cloud" page, scroll down the left navigation panel and choose "Environment Settings". </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step3.png"/>
4. On the "Environment Settings" page, select the "Subscription" by clicking on the "Name".</br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step4.png"/>
5. Under the "Settings | Defender plans " page, click on the "Email Notifications". </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step5.png"/>
6. On the "Settings | Email notifications" page under "Email recipients" if the "Additional email addresses (separated by commas)" is empty and only "owner" is selected in "All users with the following roles" then high severity alerts are not configured to be sent to the admins. </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step6.png"/>
7. Under "Email recipients", click the dropdown for "All users with the following roles" and check mark "AccountAdmin and "ServiceAdmin" along with owner and enter one or more than one "Email addresses" separated by "comma in section "Additional email addresses (separated by commas)". </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step7.png"/>
8. Under "Notification types" select "High" from the dropdown next to "Notify about alerts with the following severity (or higher). Click on the "Save" button to make the changes. </br> <img src="/resources/azure/defender/high-severity-alerts-enabled/step8.png"/>
9. Repeat step number 3 - 8 to ensure that high severity alerts are configured to be sent to subscription owners. </br>
27 changes: 27 additions & 0 deletions en/azure/defender/monitor-endpoint-protection.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AZURE / Defender / Monitor Endpoint Protection

## Quick Info

| ||
|-|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Plugin Title** | Monitor Endpoint Protection|
| **Cloud** | AZURE|
| **Category** | Defender|
| **Description** | Ensures Endpoint Protection monitoring is enabled in Microsoft Defender.|
| **More Info** | When this setting is enabled, Microsoft Defender for Cloud audits the Endpoint Protection setting for all virtual machines for malware protection.|
| **AZURE Link** | https://learn.microsoft.com/en-us/azure/defender-for-cloud/policy-reference|
| **Recommended Action** | Enable Adaptive Application Controls for Endpoint Protection from the Microsoft Defender by ensuring AuditIfNotExists setting is used to monitor missing Endpoint Protection. |

## Detailed Remediation Steps
1. Log in to the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for "Microsoft Defender for Cloud". </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step2.png"/>
3. Scroll down the left navigation panel and select "Environment Settings" under "Management".</br> <img src="/resources/azure/defender/monitor-endpoint-protection/step3.png"/>
4. On the "Microsoft Defender for Cloud | Environment settings" page, under the "Name" column, select the "Subscription Name" that needs to be verified by clicking on its Name. </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step4.png"/>
5. On the "Settings" page, Defender Plans. Select the "Settings & Monitoring" Tab on the top. </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step5.png"/>
6. On the "Settings | Defender plans" page, Navigate to the "Guest Configuration agent" plan. </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step6.png"/>
7. Enable the "Guest Configuration agent" by toggling its Status to "On". </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step7.png"/>
8. On the "Settings & Monitoring" Page, click on the "Continue" Button at the top. </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step8.png"/>
9. On the "Settings | Defender plans" Page, click on the "Save" Button at the top. </br> <img src="/resources/azure/defender/monitor-endpoint-protection/step9.png"/>
10. Repeat steps 3 - 9 to ensure "Endpoint Protection Monitoring" is configured from Microsoft Defender for Cloud. </br>
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AZURE / Defender / Monitor External Accounts with Write Permissions

## Quick Info

| ||
|-|----------------------------------------------------------------------------------------------------------------|
| **Plugin Title** | Monitor External Accounts with Write Permissions|
| **Cloud** | AZURE |
| **Category** | Defender |
| **Description** | Ensures that External Accounts with Write Permissions are being Monitored in Microsoft Defender. |
| **More Info** | External Accounts with Write Permissions should be monitored to meet you organization's security compliance requirements. |
| **AZURE Link** | https://learn.microsoft.com/en-us/azure/defender-for-cloud/policy-reference |
| **Recommended Action** | Enable Monitor for External Accounts with Write Permissions by ensuring AuditIfNotExists setting is used for 'External accounts with write permissions should be removed from your subscription' from the Microsoft Defender. |

## Detailed Remediation Steps

1. Log in to the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for "Policy" and select the "Policy". </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step2.png"/>
3. Scroll down the left navigation panel and select "Compliance". </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step3.png"/>
4. On the "Policy | Compliance" page, under "Name" column select compliance for the "Scope" of necessary Subscription. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step4.png"/>
5. On the "Policy| Compliance" page select the "View Assignment" Tab on the top. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step5.png"/>
6. On the "Policy| Compliance | Subscription" page, Select the "Edit Assignment" Tab at the top. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step6.png"/>
7. On the Assign Initiative page, select the "Parameters" tab and uncheck "Only show parameters that need input or review". It will show you a list of parameters. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step7.png"/>
8. In the list search for the setting "External accounts with write permissions should be removed from your subscription". If it's set to "Disabled" then "External accounts Monitoring" is not enabled on the selected "Subscription". </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step8.png"/>
9. To enable "External accounts Monitoring" click to open the dropdown of "External accounts with write permissions should be removed from your subscription" and select the "AuditIfNotExists" option. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step9.png"/>
10. Click on the "Review + save" button to make the necessary changes. </br> <img src="/resources/azure/defender/monitor-external-accounts-with-write-permissions/step10.png"/>
11. Repeat steps number 3 - 10 to ensure ""External accounts Monitoring" is configured from the Azure Defender. </br>
29 changes: 29 additions & 0 deletions en/azure/defender/monitor-ip-forwarding.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AZURE / Defender / Monitor IP Forwarding

## Quick Info

| | |
|-|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Plugin Title** | Monitor IP Forwarding|
| **Cloud** | AZURE |
| **Category** | Defender |
| **Description** | Ensures that Virtual Machine IP Forwarding Monitoring is enabled in Microsoft Defender. |
| **More Info** | IP Forwarding feature should be monitored to meet you organization's security compliance requirements. |
| **AZURE Link** | https://learn.microsoft.com/en-us/azure/defender-for-cloud/policy-reference |
| **Recommended Action** | Enable IP Forwarding Monitoring by ensuring AuditIfNotExists setting is used for 'IP Forwarding on your virtual machine should be disabled' from the Microsoft Defender. |

## Detailed Remediation Steps

1. Log in to the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for "Policy" and select the "Policy". </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step2.png"/>
3. Scroll down the left navigation panel and select "Compliance". </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step3.png"/>
4. On the "Policy | Compliance" page, under "Name" column select compliance for the "Scope" of necessary Subscription. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step4.png"/>
5. On the "Policy| Compliance" page select the "View Assignment" Tab on the top. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step5.png"/>
6. On the "Policy| Compliance | Subscription" page, Select the "Edit Assignment" Tab at the top. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step6.png"/>
7. On the Assign Initiative page, select the "Parameters" tab and uncheck "Only show parameters that need input or review". It will show you a list of parameters. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step7.png"/>
8. In the list search for the setting "IP Forwarding on your virtual machine should be disabled". If it's set to "Disabled" then "IP Forwarding Monitoring" is not enabled on the selected "Subscription". </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step8.png"/>
9. To enable "IP Forwarding Monitoring" click to open the dropdown of "IP Forwarding on your virtual machine should be disabled" and select the "AuditIfNotExists" option. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step9.png"/>
10. Click on the "Review + save" button to make the necessary changes. </br> <img src="/resources/azure/defender/monitor-ip-forwarding/step10.png"/>
11. Repeat steps number 3 - 10 to ensure "IP Forwarding Monitoring" is configured from the Azure Defender.</br>
Loading

0 comments on commit 3f08e8f

Please sign in to comment.